Title |
Application of merkelized abstract syntax trees to the Internet of Things location-based cybersecurity solutions / |
Authors |
Bagdonas, Kazimieras ; Venčkauskas, Algimantas |
DOI |
10.15388/DAMSS.13.2022 |
ISBN |
9786090707944 |
eISBN |
9786090707951 |
Full Text |
|
Is Part of |
DAMSS 2022: 13th conference on data analysis methods for software systems, Druskininkai, Lithuania, December 1–3, 2022 / Lithuanian computer society, Vilnius university Institute of data science and digital technologies, Lithuanian academy of sciences.. Vilnius : Vilnius university press, 2022. p. 8.. ISBN 9786090707944. eISBN 9786090707951 |
Abstract [eng] |
In this paper, we present a novel method for geolocation data integration into a multimodal Internet of Things (IoT) security solution using Merkelized Abstract Syntax Trees (MAST). The proposed method has been developed for the IoT devices operating in the IoT Fog, communicating with the Edge devices. The proposed method allows the exploitation of the IoT Networks Node’s (NN) localization solution for data source authentication and data validation. Localization solutions can be obtained via external systems (e.g. GNSS) or can be derived from IoT localization techniques. The least significant bits of the localization solution are masked to provide the desired geographical Zone of Validity (ZoV). The amount of masked bits defines the size of the ZoV. No other information except the number of masked bits needs to be communicated from the Edge node to the NN. In cases where improved security is required, additional parameters, such as IDs and location data of neighboring IoT NNs, can be incorporated into the extended MAST structure to enhance security. This information must be present in the Edge nodes in order to validate the signature solution. A proposed novel approach to coordinate verification allows the transmission of hashed values without the need to reveal either the information on the ZoV by the Edge node or the exact coordinates by the NN. The simulation of the algorithm is analyzed and discussed. The proposed method is numerically investigated in regard to the uncertainties introduced by the expected compounded localization errors in IoT adhoc networks. The impact on computational and bandwidth requirements is analyzed in relation to the desired level of security. The obtained results provide insight into the possible envelope of application for the proposed method. |
Published |
Vilnius : Vilnius university press, 2022 |
Type |
Conference paper |
Language |
English |
Publication date |
2022 |
CC license |
|